SlideShare uma empresa Scribd logo
1 de 13
National Policy Guidance for Protecting NASA Space Systems Randy Seftas Code 599.0, Mission Engineering and Systems Analysis Division E-Mail:  george.r.seftas@nasa.gov Phone:  301-286-5765
2010 National Space Policy (Protection) Principles The United States will employ a variety of measures to help assure the use of space for all responsible parties, and, consistent with the inherent right of self-defense, deter others from interference and attack, defend our space systems and contribute to the defense of allied space systems, and, if deterrence fails, defeat efforts to attack them. Goals Increase assurance and resilience of mission-essential functions enabled by commercial, civil, scientific, and national security spacecraft and supporting infrastructure against disruption, degradation, and destruction, whether from environmental, mechanical, electronic, or hostile causes. Inter-Sector Guidelines Assurance and Resilience of Mission-Essential Functions.  The US shall: Assure space-enabled mission-essential functions by developing the techniques, measures, relationships, and capabilities necessary to maintain continuity of services Such efforts may include enhancing the protection and resilience of selected spacecraft and supporting infrastructure Develop and exercise capabilities and plans for operating in and through a degraded, disrupted, or denied space environment for the purposes of maintaining mission-essential functions Address mission assurance requirements and space system resilience in the acquisition of future space capabilities and supporting infrastructure
Protection Categories NASA’s existing protection policies and requirements basically fall into two very distinct (and in some cases, mutually exclusive) categories, which are: Protecting the terrestrial and space environments from naturally occurring events, and activities associated with the operation of NASA space systems. This protection category is strategic in nature and delineates environmental policies and requirements for protection domains ranging from any place on the Earth to planets in our solar system. Earth Environment - The Earth or terrestrial environment protection domain includes subsea regions, the surface of the planet and extends out 50 statute miles above mean sea level (MSL). Near Earth Space – The near Earth space protection domain begins at 50 statute miles above MSL and extends out to geosynchronous orbit altitude (approximately 22,300 miles).  This protection domain includes the area of space that has the highest concentration of orbiting man-made satellites and launch vehicle upper stages. Interplanetary Space – The interplanetary space protection domain begins at geosynchronous orbit altitude and extends beyond our solar system.  This domain includes spacecraft orbiting around the Moon and planets. Protecting NASA space assets from intentional or unintentional disruption, exploitation or attack, whether natural or man-made is the second NASA protection category.  This category delineates policies to achieve sustained mission assurance/survivability of NASA space systems through the reduction of susceptibilities and the mitigation of vulnerabilities.
Environmental Protection Policy Decomposition (Terrestrial)
Space Asset Protection Policy Decomposition (Ground Segment) Analysis –Space Asset Protection Policies and Requirements (Ground Segment) Institutional Security – The national space policy does not specifically provide guidance on protecting the ground segment of US space systems, even though there are interagency issues regarding this topic, such as critical commercial infrastructure support to NASA space flight Centers. NASA has policy directives and requirements documents that provide guidance on implementing institutional security disciplines to protect the Agency’s people and property however, this guidance is more focused on providing institutional security for large NASA organizations, i.e., Headquarters, Centers and Flight Facilities.  What is really needed is a more tailored security focus on the high value missions that the Agency acquires and flies.
Physical Attack on the Ground Segment ,[object Object]
NASA Example:  A hard drive that contained an old version of the AQUA flight software was stolen from the AQUA/AURA hardware/software flight simulator (which is a critical node and single point-of-failure for the AQUA/AURA operational space systems).
Physical security was inadequate as there were two entrances to the simulator room and only one entrance required a key card.
IT security was inadequate since the very sensitive software on the hard drive could be downloaded to personal computers owned by personnel working in the lab.
Asymmetric Attack on Critical Commercial Infrastructure – Negates a space system’s mission performance by attacking it’s supporting commercial infrastructure.
NASA Example: An aerial fiber-optic cable that supports space operations from buildings 3, 13 and 14 at GSFC crosses Greenbelt road from the manhole trunk main-7 (single point-of-failure) and is susceptible to traffic accidents, weather and sabotage.
Open Source Example:  For the fourth time in a week, an undersea communications cable has apparently been cut (or "failed due to a power outage," as some sources suggest), and while no official reports of subversion have surfaced just yet, things are beginning to get suspicious.Agency Approval Project Formulation  Project Implementation  Phase E:  Phase B:  Phase D: System  Phase F:  Phase A: Concept  Phase C: Final  Pre - Phase A:   Operations and  Preliminary Design  Assembly,  Closeout and Technology  Design and  Concept Studies Sustainment &Technology  Integration, Test  Development Fabrication Completion and  Launch Affected Phases of a Typical Mission’s Lifecycle
Space Asset Protection Policy Decomposition (Comm/Info Segment) Analysis –Space Asset Protection Policies and Requirements (Comm/Info Segment) Information Systems and Network  Security – Much like the other NASA institutional security disciplines the Agency’s IT Security organizations are focused on providing IT security for large NASA groups, i.e., Headquarters, Centers and Flight Facilities.  What is really needed is a more tailored IT security focus on the projects that the Agency acquires and flies so as to counter Computer Network Attacks (CNA) and Exploitations (CNE) against these high-value space assets

Mais conteúdo relacionado

Mais procurados

Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18David Sweigert
 
Time Flies H4D 2020 Lessons Learned
Time Flies H4D 2020 Lessons LearnedTime Flies H4D 2020 Lessons Learned
Time Flies H4D 2020 Lessons LearnedStanford University
 
Seacurity Hacking for Defense 2017
Seacurity Hacking for Defense 2017Seacurity Hacking for Defense 2017
Seacurity Hacking for Defense 2017Stanford University
 
Guardian Week 6 H4D Stanford 2016
Guardian Week 6 H4D Stanford 2016Guardian Week 6 H4D Stanford 2016
Guardian Week 6 H4D Stanford 2016Stanford University
 
Jose Davila Cv 060309
Jose Davila Cv 060309Jose Davila Cv 060309
Jose Davila Cv 060309jdavila04
 
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...Power System Operation
 
Innovation fund themed competition webinar - session 2
Innovation fund themed competition webinar - session 2Innovation fund themed competition webinar - session 2
Innovation fund themed competition webinar - session 2Heather-Fiona Egan
 
Austra Lumina Hacking for Defense 2017
Austra Lumina Hacking for Defense 2017Austra Lumina Hacking for Defense 2017
Austra Lumina Hacking for Defense 2017Stanford University
 
CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013Ian Sommerville
 
CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013Ian Sommerville
 
Broadcom - Hacking for Defense - Stanford 2017
Broadcom - Hacking for Defense - Stanford 2017Broadcom - Hacking for Defense - Stanford 2017
Broadcom - Hacking for Defense - Stanford 2017Stanford University
 
7 Software Development Security
7 Software Development Security7 Software Development Security
7 Software Development SecurityAlfred Ouyang
 
Anthro Energy H4D 2020 lessons learned
Anthro Energy H4D 2020 lessons learnedAnthro Energy H4D 2020 lessons learned
Anthro Energy H4D 2020 lessons learnedStanford University
 
Guardian Week 4 H4D Stanford 2016
Guardian Week 4 H4D Stanford 2016Guardian Week 4 H4D Stanford 2016
Guardian Week 4 H4D Stanford 2016Stanford University
 
AV Combinator H4D 2020 Lessons Learned
AV Combinator H4D 2020 Lessons LearnedAV Combinator H4D 2020 Lessons Learned
AV Combinator H4D 2020 Lessons LearnedStanford University
 
US military report on cyber guard use of National Guard
US military report on cyber guard use of National GuardUS military report on cyber guard use of National Guard
US military report on cyber guard use of National GuardDavid Sweigert
 

Mais procurados (20)

Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18
 
Polaris H4D Stanford 2018
Polaris H4D Stanford 2018Polaris H4D Stanford 2018
Polaris H4D Stanford 2018
 
Time Flies H4D 2020 Lessons Learned
Time Flies H4D 2020 Lessons LearnedTime Flies H4D 2020 Lessons Learned
Time Flies H4D 2020 Lessons Learned
 
Agile and the DoD
Agile and the DoDAgile and the DoD
Agile and the DoD
 
Tgs capabilities brief
Tgs capabilities briefTgs capabilities brief
Tgs capabilities brief
 
Seacurity Hacking for Defense 2017
Seacurity Hacking for Defense 2017Seacurity Hacking for Defense 2017
Seacurity Hacking for Defense 2017
 
Guardian Week 6 H4D Stanford 2016
Guardian Week 6 H4D Stanford 2016Guardian Week 6 H4D Stanford 2016
Guardian Week 6 H4D Stanford 2016
 
Jose Davila Cv 060309
Jose Davila Cv 060309Jose Davila Cv 060309
Jose Davila Cv 060309
 
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
 
Innovation fund themed competition webinar - session 2
Innovation fund themed competition webinar - session 2Innovation fund themed competition webinar - session 2
Innovation fund themed competition webinar - session 2
 
Austra Lumina Hacking for Defense 2017
Austra Lumina Hacking for Defense 2017Austra Lumina Hacking for Defense 2017
Austra Lumina Hacking for Defense 2017
 
CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013
 
CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013
 
Skynet Week 3 H4D Stanford 2016
Skynet Week 3 H4D Stanford 2016Skynet Week 3 H4D Stanford 2016
Skynet Week 3 H4D Stanford 2016
 
Broadcom - Hacking for Defense - Stanford 2017
Broadcom - Hacking for Defense - Stanford 2017Broadcom - Hacking for Defense - Stanford 2017
Broadcom - Hacking for Defense - Stanford 2017
 
7 Software Development Security
7 Software Development Security7 Software Development Security
7 Software Development Security
 
Anthro Energy H4D 2020 lessons learned
Anthro Energy H4D 2020 lessons learnedAnthro Energy H4D 2020 lessons learned
Anthro Energy H4D 2020 lessons learned
 
Guardian Week 4 H4D Stanford 2016
Guardian Week 4 H4D Stanford 2016Guardian Week 4 H4D Stanford 2016
Guardian Week 4 H4D Stanford 2016
 
AV Combinator H4D 2020 Lessons Learned
AV Combinator H4D 2020 Lessons LearnedAV Combinator H4D 2020 Lessons Learned
AV Combinator H4D 2020 Lessons Learned
 
US military report on cyber guard use of National Guard
US military report on cyber guard use of National GuardUS military report on cyber guard use of National Guard
US military report on cyber guard use of National Guard
 

Destaque

Costello kenneth
Costello kennethCostello kenneth
Costello kennethNASAPMC
 
Fred.ouellette
Fred.ouelletteFred.ouellette
Fred.ouelletteNASAPMC
 
Kothari.d.mitchell.r
Kothari.d.mitchell.rKothari.d.mitchell.r
Kothari.d.mitchell.rNASAPMC
 
Lisa mc cann
Lisa mc cannLisa mc cann
Lisa mc cannNASAPMC
 
Randy.lovell
Randy.lovellRandy.lovell
Randy.lovellNASAPMC
 
Biess ted
Biess tedBiess ted
Biess tedNASAPMC
 
Michael.hazen
Michael.hazenMichael.hazen
Michael.hazenNASAPMC
 
Rovinsky final
Rovinsky finalRovinsky final
Rovinsky finalNASAPMC
 
Randall.taylor
Randall.taylorRandall.taylor
Randall.taylorNASAPMC
 
Zimmerman barbier
Zimmerman barbierZimmerman barbier
Zimmerman barbierNASAPMC
 
Vipavetz.kevin
Vipavetz.kevinVipavetz.kevin
Vipavetz.kevinNASAPMC
 
Krahula john
Krahula johnKrahula john
Krahula johnNASAPMC
 
Ipao great houseetc-programmatic analysis ll
Ipao great houseetc-programmatic analysis llIpao great houseetc-programmatic analysis ll
Ipao great houseetc-programmatic analysis llNASAPMC
 
Yew manson
Yew mansonYew manson
Yew mansonNASAPMC
 
Gwyn.smith
Gwyn.smithGwyn.smith
Gwyn.smithNASAPMC
 
Anderson.joel
Anderson.joelAnderson.joel
Anderson.joelNASAPMC
 
Dumbacher
DumbacherDumbacher
DumbacherNASAPMC
 
Engelbrecht.joe
Engelbrecht.joeEngelbrecht.joe
Engelbrecht.joeNASAPMC
 

Destaque (20)

Costello kenneth
Costello kennethCostello kenneth
Costello kenneth
 
Heard
HeardHeard
Heard
 
Fred.ouellette
Fred.ouelletteFred.ouellette
Fred.ouellette
 
Kothari.d.mitchell.r
Kothari.d.mitchell.rKothari.d.mitchell.r
Kothari.d.mitchell.r
 
Lisa mc cann
Lisa mc cannLisa mc cann
Lisa mc cann
 
Randy.lovell
Randy.lovellRandy.lovell
Randy.lovell
 
Biess ted
Biess tedBiess ted
Biess ted
 
Michael.hazen
Michael.hazenMichael.hazen
Michael.hazen
 
Rovinsky final
Rovinsky finalRovinsky final
Rovinsky final
 
Randall.taylor
Randall.taylorRandall.taylor
Randall.taylor
 
B leach
B leachB leach
B leach
 
Zimmerman barbier
Zimmerman barbierZimmerman barbier
Zimmerman barbier
 
Vipavetz.kevin
Vipavetz.kevinVipavetz.kevin
Vipavetz.kevin
 
Krahula john
Krahula johnKrahula john
Krahula john
 
Ipao great houseetc-programmatic analysis ll
Ipao great houseetc-programmatic analysis llIpao great houseetc-programmatic analysis ll
Ipao great houseetc-programmatic analysis ll
 
Yew manson
Yew mansonYew manson
Yew manson
 
Gwyn.smith
Gwyn.smithGwyn.smith
Gwyn.smith
 
Anderson.joel
Anderson.joelAnderson.joel
Anderson.joel
 
Dumbacher
DumbacherDumbacher
Dumbacher
 
Engelbrecht.joe
Engelbrecht.joeEngelbrecht.joe
Engelbrecht.joe
 

Semelhante a Seftas.george

WE1.L10 - TERRA, AQUA, AND AURA DIRECT BROADCAST – PROVIDING EARTH SCIENCE DA...
WE1.L10 - TERRA, AQUA, AND AURA DIRECT BROADCAST – PROVIDING EARTH SCIENCE DA...WE1.L10 - TERRA, AQUA, AND AURA DIRECT BROADCAST – PROVIDING EARTH SCIENCE DA...
WE1.L10 - TERRA, AQUA, AND AURA DIRECT BROADCAST – PROVIDING EARTH SCIENCE DA...grssieee
 
Satellite Network Hacking & Security Analysis
Satellite Network Hacking & Security AnalysisSatellite Network Hacking & Security Analysis
Satellite Network Hacking & Security AnalysisCSCJournals
 
NICE_DRS_presentation_060710 (1)
NICE_DRS_presentation_060710 (1)NICE_DRS_presentation_060710 (1)
NICE_DRS_presentation_060710 (1)Stefano Coltellacci
 
body_The_Case_for_APNT_Development_for_Aviation
body_The_Case_for_APNT_Development_for_Aviationbody_The_Case_for_APNT_Development_for_Aviation
body_The_Case_for_APNT_Development_for_AviationAriel Scheirer
 
Defense technology writing sample
Defense technology writing sampleDefense technology writing sample
Defense technology writing sampleBernie Adelsberger
 
Can Humans Survive 1000 Days in Space?
Can Humans Survive 1000 Days in Space? Can Humans Survive 1000 Days in Space?
Can Humans Survive 1000 Days in Space? mtnadmin
 
Space Weather And International Civil Space Situational Awareness ( Met...
Space  Weather And  International  Civil  Space  Situational  Awareness ( Met...Space  Weather And  International  Civil  Space  Situational  Awareness ( Met...
Space Weather And International Civil Space Situational Awareness ( Met...Western Governors University
 
N9 Anselmo - "security in space"
N9 Anselmo - "security in space"N9 Anselmo - "security in space"
N9 Anselmo - "security in space"IAPS
 
DARPA TTO Office- wide BAA Technology Requirements Apr 2013
DARPA TTO Office- wide BAA Technology Requirements Apr 2013DARPA TTO Office- wide BAA Technology Requirements Apr 2013
DARPA TTO Office- wide BAA Technology Requirements Apr 2013Tom "Blad" Lindblad
 
High-Altitude Solar Glider for Internet Access
High-Altitude Solar Glider for Internet AccessHigh-Altitude Solar Glider for Internet Access
High-Altitude Solar Glider for Internet AccessJeffrey Funk
 
3309_Space_Situational_Awareness_2015_4pp
3309_Space_Situational_Awareness_2015_4pp3309_Space_Situational_Awareness_2015_4pp
3309_Space_Situational_Awareness_2015_4ppTiziana Casinelli
 
Teledyne Brown Engineering Slides
Teledyne Brown Engineering Slides Teledyne Brown Engineering Slides
Teledyne Brown Engineering Slides CASIS
 
NOAA, UAH, EMA, NWS enrGies article
NOAA, UAH, EMA, NWS enrGies articleNOAA, UAH, EMA, NWS enrGies article
NOAA, UAH, EMA, NWS enrGies articleKenneth Harvey
 
A Summary Of NASA Architecture Studies Utilizing Fission Surface Power Techno...
A Summary Of NASA Architecture Studies Utilizing Fission Surface Power Techno...A Summary Of NASA Architecture Studies Utilizing Fission Surface Power Techno...
A Summary Of NASA Architecture Studies Utilizing Fission Surface Power Techno...Lori Moore
 
Communication Systems Proposal- Final
Communication Systems Proposal- FinalCommunication Systems Proposal- Final
Communication Systems Proposal- FinalChristine Odenwald
 
Inadequate Security Practices Expose Key NASA Network to Cyber Attack
Inadequate Security Practices Expose Key NASA Network to Cyber AttackInadequate Security Practices Expose Key NASA Network to Cyber Attack
Inadequate Security Practices Expose Key NASA Network to Cyber AttackBill Duncan
 

Semelhante a Seftas.george (20)

WE1.L10 - TERRA, AQUA, AND AURA DIRECT BROADCAST – PROVIDING EARTH SCIENCE DA...
WE1.L10 - TERRA, AQUA, AND AURA DIRECT BROADCAST – PROVIDING EARTH SCIENCE DA...WE1.L10 - TERRA, AQUA, AND AURA DIRECT BROADCAST – PROVIDING EARTH SCIENCE DA...
WE1.L10 - TERRA, AQUA, AND AURA DIRECT BROADCAST – PROVIDING EARTH SCIENCE DA...
 
Satellite Network Hacking & Security Analysis
Satellite Network Hacking & Security AnalysisSatellite Network Hacking & Security Analysis
Satellite Network Hacking & Security Analysis
 
NICE_DRS_presentation_060710 (1)
NICE_DRS_presentation_060710 (1)NICE_DRS_presentation_060710 (1)
NICE_DRS_presentation_060710 (1)
 
CLIM Program: Remote Sensing Workshop, Satellites and Stovepipes - Jay Morris...
CLIM Program: Remote Sensing Workshop, Satellites and Stovepipes - Jay Morris...CLIM Program: Remote Sensing Workshop, Satellites and Stovepipes - Jay Morris...
CLIM Program: Remote Sensing Workshop, Satellites and Stovepipes - Jay Morris...
 
body_The_Case_for_APNT_Development_for_Aviation
body_The_Case_for_APNT_Development_for_Aviationbody_The_Case_for_APNT_Development_for_Aviation
body_The_Case_for_APNT_Development_for_Aviation
 
Defense technology writing sample
Defense technology writing sampleDefense technology writing sample
Defense technology writing sample
 
Systems Engineering Update - Dr. Ron Sega
Systems Engineering Update - Dr. Ron SegaSystems Engineering Update - Dr. Ron Sega
Systems Engineering Update - Dr. Ron Sega
 
Can Humans Survive 1000 Days in Space?
Can Humans Survive 1000 Days in Space? Can Humans Survive 1000 Days in Space?
Can Humans Survive 1000 Days in Space?
 
Space Weather And International Civil Space Situational Awareness ( Met...
Space  Weather And  International  Civil  Space  Situational  Awareness ( Met...Space  Weather And  International  Civil  Space  Situational  Awareness ( Met...
Space Weather And International Civil Space Situational Awareness ( Met...
 
N9 Anselmo - "security in space"
N9 Anselmo - "security in space"N9 Anselmo - "security in space"
N9 Anselmo - "security in space"
 
DARPA TTO Office- wide BAA Technology Requirements Apr 2013
DARPA TTO Office- wide BAA Technology Requirements Apr 2013DARPA TTO Office- wide BAA Technology Requirements Apr 2013
DARPA TTO Office- wide BAA Technology Requirements Apr 2013
 
High-Altitude Solar Glider for Internet Access
High-Altitude Solar Glider for Internet AccessHigh-Altitude Solar Glider for Internet Access
High-Altitude Solar Glider for Internet Access
 
3309_Space_Situational_Awareness_2015_4pp
3309_Space_Situational_Awareness_2015_4pp3309_Space_Situational_Awareness_2015_4pp
3309_Space_Situational_Awareness_2015_4pp
 
Teledyne Brown Engineering Slides
Teledyne Brown Engineering Slides Teledyne Brown Engineering Slides
Teledyne Brown Engineering Slides
 
Remotesensing 04-01671
Remotesensing 04-01671Remotesensing 04-01671
Remotesensing 04-01671
 
NOAA, UAH, EMA, NWS enrGies article
NOAA, UAH, EMA, NWS enrGies articleNOAA, UAH, EMA, NWS enrGies article
NOAA, UAH, EMA, NWS enrGies article
 
A Summary Of NASA Architecture Studies Utilizing Fission Surface Power Techno...
A Summary Of NASA Architecture Studies Utilizing Fission Surface Power Techno...A Summary Of NASA Architecture Studies Utilizing Fission Surface Power Techno...
A Summary Of NASA Architecture Studies Utilizing Fission Surface Power Techno...
 
Communication Systems Proposal- Final
Communication Systems Proposal- FinalCommunication Systems Proposal- Final
Communication Systems Proposal- Final
 
Moore chris[1]
Moore chris[1]Moore chris[1]
Moore chris[1]
 
Inadequate Security Practices Expose Key NASA Network to Cyber Attack
Inadequate Security Practices Expose Key NASA Network to Cyber AttackInadequate Security Practices Expose Key NASA Network to Cyber Attack
Inadequate Security Practices Expose Key NASA Network to Cyber Attack
 

Mais de NASAPMC

Bejmuk bo
Bejmuk boBejmuk bo
Bejmuk boNASAPMC
 
Baniszewski john
Baniszewski johnBaniszewski john
Baniszewski johnNASAPMC
 
Yew manson
Yew mansonYew manson
Yew mansonNASAPMC
 
Wood frank
Wood frankWood frank
Wood frankNASAPMC
 
Wood frank
Wood frankWood frank
Wood frankNASAPMC
 
Wessen randi (cd)
Wessen randi (cd)Wessen randi (cd)
Wessen randi (cd)NASAPMC
 
Vellinga joe
Vellinga joeVellinga joe
Vellinga joeNASAPMC
 
Trahan stuart
Trahan stuartTrahan stuart
Trahan stuartNASAPMC
 
Stock gahm
Stock gahmStock gahm
Stock gahmNASAPMC
 
Snow lee
Snow leeSnow lee
Snow leeNASAPMC
 
Smalley sandra
Smalley sandraSmalley sandra
Smalley sandraNASAPMC
 
Seftas krage
Seftas krageSeftas krage
Seftas krageNASAPMC
 
Sampietro marco
Sampietro marcoSampietro marco
Sampietro marcoNASAPMC
 
Rudolphi mike
Rudolphi mikeRudolphi mike
Rudolphi mikeNASAPMC
 
Roberts karlene
Roberts karleneRoberts karlene
Roberts karleneNASAPMC
 
Rackley mike
Rackley mikeRackley mike
Rackley mikeNASAPMC
 
Paradis william
Paradis williamParadis william
Paradis williamNASAPMC
 
Osterkamp jeff
Osterkamp jeffOsterkamp jeff
Osterkamp jeffNASAPMC
 
O'keefe william
O'keefe williamO'keefe william
O'keefe williamNASAPMC
 
Muller ralf
Muller ralfMuller ralf
Muller ralfNASAPMC
 

Mais de NASAPMC (20)

Bejmuk bo
Bejmuk boBejmuk bo
Bejmuk bo
 
Baniszewski john
Baniszewski johnBaniszewski john
Baniszewski john
 
Yew manson
Yew mansonYew manson
Yew manson
 
Wood frank
Wood frankWood frank
Wood frank
 
Wood frank
Wood frankWood frank
Wood frank
 
Wessen randi (cd)
Wessen randi (cd)Wessen randi (cd)
Wessen randi (cd)
 
Vellinga joe
Vellinga joeVellinga joe
Vellinga joe
 
Trahan stuart
Trahan stuartTrahan stuart
Trahan stuart
 
Stock gahm
Stock gahmStock gahm
Stock gahm
 
Snow lee
Snow leeSnow lee
Snow lee
 
Smalley sandra
Smalley sandraSmalley sandra
Smalley sandra
 
Seftas krage
Seftas krageSeftas krage
Seftas krage
 
Sampietro marco
Sampietro marcoSampietro marco
Sampietro marco
 
Rudolphi mike
Rudolphi mikeRudolphi mike
Rudolphi mike
 
Roberts karlene
Roberts karleneRoberts karlene
Roberts karlene
 
Rackley mike
Rackley mikeRackley mike
Rackley mike
 
Paradis william
Paradis williamParadis william
Paradis william
 
Osterkamp jeff
Osterkamp jeffOsterkamp jeff
Osterkamp jeff
 
O'keefe william
O'keefe williamO'keefe william
O'keefe william
 
Muller ralf
Muller ralfMuller ralf
Muller ralf
 

Último

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Último (20)

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Seftas.george

  • 1. National Policy Guidance for Protecting NASA Space Systems Randy Seftas Code 599.0, Mission Engineering and Systems Analysis Division E-Mail: george.r.seftas@nasa.gov Phone: 301-286-5765
  • 2. 2010 National Space Policy (Protection) Principles The United States will employ a variety of measures to help assure the use of space for all responsible parties, and, consistent with the inherent right of self-defense, deter others from interference and attack, defend our space systems and contribute to the defense of allied space systems, and, if deterrence fails, defeat efforts to attack them. Goals Increase assurance and resilience of mission-essential functions enabled by commercial, civil, scientific, and national security spacecraft and supporting infrastructure against disruption, degradation, and destruction, whether from environmental, mechanical, electronic, or hostile causes. Inter-Sector Guidelines Assurance and Resilience of Mission-Essential Functions. The US shall: Assure space-enabled mission-essential functions by developing the techniques, measures, relationships, and capabilities necessary to maintain continuity of services Such efforts may include enhancing the protection and resilience of selected spacecraft and supporting infrastructure Develop and exercise capabilities and plans for operating in and through a degraded, disrupted, or denied space environment for the purposes of maintaining mission-essential functions Address mission assurance requirements and space system resilience in the acquisition of future space capabilities and supporting infrastructure
  • 3. Protection Categories NASA’s existing protection policies and requirements basically fall into two very distinct (and in some cases, mutually exclusive) categories, which are: Protecting the terrestrial and space environments from naturally occurring events, and activities associated with the operation of NASA space systems. This protection category is strategic in nature and delineates environmental policies and requirements for protection domains ranging from any place on the Earth to planets in our solar system. Earth Environment - The Earth or terrestrial environment protection domain includes subsea regions, the surface of the planet and extends out 50 statute miles above mean sea level (MSL). Near Earth Space – The near Earth space protection domain begins at 50 statute miles above MSL and extends out to geosynchronous orbit altitude (approximately 22,300 miles). This protection domain includes the area of space that has the highest concentration of orbiting man-made satellites and launch vehicle upper stages. Interplanetary Space – The interplanetary space protection domain begins at geosynchronous orbit altitude and extends beyond our solar system. This domain includes spacecraft orbiting around the Moon and planets. Protecting NASA space assets from intentional or unintentional disruption, exploitation or attack, whether natural or man-made is the second NASA protection category. This category delineates policies to achieve sustained mission assurance/survivability of NASA space systems through the reduction of susceptibilities and the mitigation of vulnerabilities.
  • 4. Environmental Protection Policy Decomposition (Terrestrial)
  • 5. Space Asset Protection Policy Decomposition (Ground Segment) Analysis –Space Asset Protection Policies and Requirements (Ground Segment) Institutional Security – The national space policy does not specifically provide guidance on protecting the ground segment of US space systems, even though there are interagency issues regarding this topic, such as critical commercial infrastructure support to NASA space flight Centers. NASA has policy directives and requirements documents that provide guidance on implementing institutional security disciplines to protect the Agency’s people and property however, this guidance is more focused on providing institutional security for large NASA organizations, i.e., Headquarters, Centers and Flight Facilities. What is really needed is a more tailored security focus on the high value missions that the Agency acquires and flies.
  • 6.
  • 7. NASA Example: A hard drive that contained an old version of the AQUA flight software was stolen from the AQUA/AURA hardware/software flight simulator (which is a critical node and single point-of-failure for the AQUA/AURA operational space systems).
  • 8. Physical security was inadequate as there were two entrances to the simulator room and only one entrance required a key card.
  • 9. IT security was inadequate since the very sensitive software on the hard drive could be downloaded to personal computers owned by personnel working in the lab.
  • 10. Asymmetric Attack on Critical Commercial Infrastructure – Negates a space system’s mission performance by attacking it’s supporting commercial infrastructure.
  • 11. NASA Example: An aerial fiber-optic cable that supports space operations from buildings 3, 13 and 14 at GSFC crosses Greenbelt road from the manhole trunk main-7 (single point-of-failure) and is susceptible to traffic accidents, weather and sabotage.
  • 12. Open Source Example: For the fourth time in a week, an undersea communications cable has apparently been cut (or "failed due to a power outage," as some sources suggest), and while no official reports of subversion have surfaced just yet, things are beginning to get suspicious.Agency Approval Project Formulation Project Implementation Phase E: Phase B: Phase D: System Phase F: Phase A: Concept Phase C: Final Pre - Phase A: Operations and Preliminary Design Assembly, Closeout and Technology Design and Concept Studies Sustainment &Technology Integration, Test Development Fabrication Completion and Launch Affected Phases of a Typical Mission’s Lifecycle
  • 13. Space Asset Protection Policy Decomposition (Comm/Info Segment) Analysis –Space Asset Protection Policies and Requirements (Comm/Info Segment) Information Systems and Network Security – Much like the other NASA institutional security disciplines the Agency’s IT Security organizations are focused on providing IT security for large NASA groups, i.e., Headquarters, Centers and Flight Facilities. What is really needed is a more tailored IT security focus on the projects that the Agency acquires and flies so as to counter Computer Network Attacks (CNA) and Exploitations (CNE) against these high-value space assets
  • 14.
  • 15. Open Press Example: "While the Fort Belvoir site was the only downlink for the KH-11, additional sites were apparently in Hawaii and Europe"...“ In contrast, the signals from the LACROSSE/VEGA system are relayed via NASA's Tracking and Data Relay Satellites (TDRS), of which there are three in orbit. The signals are then transmitted to a ground station at White Sands, New Mexico.
  • 16. Open Press Example: “The U.S. Navy is leading an initiative to exploit advanced new NASA and commercial environmental satellite imagery and data to aid time-critical strike planning-including weapons selection-for Afghanistan and potential other target areas in the Middle East, such as Iraq”.
  • 17. Computer Network Exploitation - operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks
  • 18. Open Press Example: Officials at APL discovered "penetration from an unwanted source" last year on its external Web site, prompting them to take the site offline. APL officials are trying to figure out exactly what information was accessed.Agency Approval Project Formulation Project Implementation Phase E: Phase B: Phase D: System Phase F: Phase A: Concept Phase C: Final Pre - Phase A: Operations and Preliminary Design Assembly, Closeout and Technology Design and Concept Studies Sustainment &Technology Integration, Test Development Fabrication Completion and Launch Affected Phases of a Typical Mission’s Lifecycle
  • 19.
  • 20. Open Press Example: Telstar-12 was successfully jammed while attempting to broadcast a Persian news TV program into Iran under the stewardship of the State Department. The U.S. was able to trace the jamming signal to Bejucal - the former Soviet signals intelligence base in Cuba. Despite protests from the State Department Cuba continued to allow the Iranian diplomatic presence in Cuba to jam Telstar-12 for weeks.
  • 21. Open Press Example: Libya has waged a jamming war against the West in a successful effort to stop an opposition radio station and also blocked dozens of television and radio stations in Europe.
  • 22. Command Link Intrusions - Only 3 NASA space systems provide protection for their command links, i.e., Space Station, Shuttle and the TDRSS
  • 23. Civil Space Examples: Between November 2007 and October 2008 the Terra and Landsat-7 spacecraft experienced four command link intrusion attempts. These attempts all occurred in the Arctic region close to the Svalbard Archipelago. The source of the intruder was never attributed.Agency Approval Project Formulation Project Implementation Phase E: Phase B: Phase D: System Phase F: Phase A: Concept Phase C: Final Pre - Phase A: Operations and Preliminary Design Assembly, Closeout and Technology Design and Concept Studies Sustainment &Technology Integration, Test Development Fabrication Completion and Launch Affected Phases
  • 24.
  • 25. Open Press Example: "The Tamil Tigers in Sri Lanka have been hacking the Intelsat that hangs over the Indian Ocean to transmit propaganda. Intelsat is trying very hard to figure out how they did it, and then keep them from doing it again”.
  • 26. Open Press Example: “Members of a hacking group called the Masters of Downloading claim to have broken into a Pentagon network and stolen software that allows them to control a military satellite system. They threaten to sell the software to terrorists. The Pentagon denies that the software is classified or that it would allow the hackers to control their satellites, but later admits that a less-secure network containing "sensitive" information had been compromised”.
  • 27. Open Press Example: One Federal Government agency warned, “One person with a computer, a modem, and a telephone line anywhere in the world can potentially…cause a power outage in an entire region.” At about the same time this statement was made, a computer hacker publicly announced that he would release a document outlining how to break into power company networks and shut down the power grids of 30 United States utility companiesAgency Approval Project Formulation Project Implementation Phase E: Phase B: Phase D: System Phase F: Phase A: Concept Phase C: Final Pre - Phase A: Operations and Preliminary Design Assembly, Closeout and Technology Design and Concept Studies Sustainment &Technology Integration, Test Development Fabrication Completion and Launch Affected Phases of a Typical Mission’s Lifecycle
  • 28. Space Asset Protection Policy Decomposition (Space System) Analysis –Space Asset Protection Policies and Requirements (Space System) Protection of Space Systems – NASA does not have any policies or requirements that address the protection of space systems and their supporting infrastructures. Assurance and Resilience – NASA does not have any policies or requirements that directly complies with the mission assurance guidance in the national space policy.
  • 29. Recommendations to Close Protection Gaps Tailor the implementation of institutional security (physical, personnel, operational) functions to space mission criticality, guided by: NPR 7120.5 - Projects are either Category 1, 2, or 3 and are assigned to a category based initially on: The project life-cycle cost (LCC) estimate, the use of nuclear power sources, and whether or not the system being developed is for human space flight Priority level, which is related to the importance of the activity to NASA, the extent of international participation (or joint effort with other government agencies), the degree of uncertainty surrounding the application of new or untested technologies, and spacecraft/ payload development risk classification NPR 8705.4 - Classification levels define a hierarchy of risk combinations for NASA payloads by considering such factors as criticality to the Agency Strategic Plan, national significance, availability of alternative research opportunities, success criteria, magnitude of investment, etc. Tailor the implementation of IT security functions guided by: NPR 7150.2 - NASA-wide definitions for software classes are based on: Usage of the software with or within a NASA system Criticality of the system to NASA's major programs and projects Extent to which humans depend upon the system Developmental and operational complexity Extent of the Agency's investment
  • 30. Recommendations to Close Protection Gaps (cont) Increase NASA’s interaction with other US Govt Agencies and Departments to protect the our ground segment mission facilities Greater collaboration between NASA and DHS to identify our mission’s critical nodes and single points-of-failure It is DHS’ responsibility to protect the critical commercial infrastructures that support NASA facilities Prioritize the allocation of law enforcement resources to protect the Agency’s highest priority sites when intelligence information indicates an elevated threat Review and expand Agency guidance (policy/requirements) on the protection of communications links Communications security (COMSEC) requirements are currently found in NPR 2810.1, Security of Information Technology Wrong NPR for COMSEC requirements – there are significant differences between the COMSEC and IT security disciplines COMSEC requirements currently found in NPR 2810.1 only address encryption as a means of protecting communication links and overlook other technical approaches Be proactive in addressing the growing threats of electromagnetic interference and jamming NASA’s existing policies and requirements may quickly become outdated by new technology, proliferation, criminal activity.

Notas do Editor

  1. Earth Environment - Identify Areas for Potential International Cooperation. Departments and agencies shall identify potential areas for international cooperation that may include, but are not limited to: Earth science and observation; environmental monitoring; disaster mitigation and relief; search and rescue.Earth Environment – Intersector Guidelines: Space Nuclear Power. The United States shall develop and use space nuclear power systems where such systems safely enable or significantly enhance space exploration or operational capabilities.Earth Environment – Civil Space Guidelines: Space Science, Exploration, and Discovery. (1) Continue a strong program of space science for observations, research, and analysis of our Sun, solar system, and universe to enhance knowledge of the cosmos, further our understanding of fundamental natural and physical sciences. (2) Pursue capabilities, in cooperation with other departments, agencies, and commercial partners, to detect, track, catalog, and characterize near-Earth objects to reduce the risk of harm to humans from an unexpected impact on our planet and to identify potentially resource-rich planetary objects Earth Environment – Civil Space Guidelines: Environmental Earth Observation and Weather. The NASA Administrator, in coordination with other appropriate departments and agencies, shall conduct a program to enhance U.S. global climate change research and sustained monitoring capabilities, advance research into and scientific knowledge of the Earth by accelerating the development of new Earth observing satellites, and develop and test capabilities for use by other civil departments and agencies for operational purposes.Near Earth – Goals: Strengthen stability in space. Strengthening measures to mitigate orbital debris.Near Earth – Intersector Guidelines: Preserve the Space Environment. Pursue research and development of technologies and techniques, through the Administrator of the National Aeronautics and Space Administration (NASA) and the Secretary of Defense, to mitigate and remove on-orbit debris, reduce hazards, and increase understanding of the current and future debris environment .Near Earth – Intersector Guidelines: Identify Areas for Potential International Cooperation . Departments and agencies shall identify potential areas for international cooperation that may include, but are not limited to: long-term preservation of the space environment for human activity and use .Near Earth – Intersector Guidelines: Space Nuclear Power. The United States shall develop and use space nuclear power systems where such systems safely enable or significantly enhance space exploration or operational capabilities.Planetary Space - Civil Space Guidelines: Space Science, Exploration, and Discovery. Set far-reaching exploration milestones. By 2025, begin crewed missions beyond the moon, including sending humans to an asteroid. By the mid-2030s, send humans to orbit Mars and return them safely to Earth
  2. Earth Environment - Identify Areas for Potential International Cooperation. Departments and agencies shall identify potential areas for international cooperation that may include, but are not limited to: Earth science and observation; environmental monitoring; disaster mitigation and relief; search and rescue.Earth Environment – Intersector Guidelines: Space Nuclear Power. The United States shall develop and use space nuclear power systems where such systems safely enable or significantly enhance space exploration or operational capabilities.Earth Environment – Civil Space Guidelines: Space Science, Exploration, and Discovery. (1) Continue a strong program of space science for observations, research, and analysis of our Sun, solar system, and universe to enhance knowledge of the cosmos, further our understanding of fundamental natural and physical sciences. (2) Pursue capabilities, in cooperation with other departments, agencies, and commercial partners, to detect, track, catalog, and characterize near-Earth objects to reduce the risk of harm to humans from an unexpected impact on our planet and to identify potentially resource-rich planetary objects Earth Environment – Civil Space Guidelines: Environmental Earth Observation and Weather. The NASA Administrator, in coordination with other appropriate departments and agencies, shall conduct a program to enhance U.S. global climate change research and sustained monitoring capabilities, advance research into and scientific knowledge of the Earth by accelerating the development of new Earth observing satellites, and develop and test capabilities for use by other civil departments and agencies for operational purposes.Near Earth – Goals: Strengthen stability in space. Strengthening measures to mitigate orbital debris.Near Earth – Intersector Guidelines: Preserve the Space Environment. Pursue research and development of technologies and techniques, through the Administrator of the National Aeronautics and Space Administration (NASA) and the Secretary of Defense, to mitigate and remove on-orbit debris, reduce hazards, and increase understanding of the current and future debris environment .Near Earth – Intersector Guidelines: Identify Areas for Potential International Cooperation . Departments and agencies shall identify potential areas for international cooperation that may include, but are not limited to: long-term preservation of the space environment for human activity and use .Near Earth – Intersector Guidelines: Space Nuclear Power. The United States shall develop and use space nuclear power systems where such systems safely enable or significantly enhance space exploration or operational capabilities.Planetary Space - Civil Space Guidelines: Space Science, Exploration, and Discovery. Set far-reaching exploration milestones. By 2025, begin crewed missions beyond the moon, including sending humans to an asteroid. By the mid-2030s, send humans to orbit Mars and return them safely to Earth
  3. Earth Environment - Identify Areas for Potential International Cooperation. Departments and agencies shall identify potential areas for international cooperation that may include, but are not limited to: Earth science and observation; environmental monitoring; disaster mitigation and relief; search and rescue.Earth Environment – Intersector Guidelines: Space Nuclear Power. The United States shall develop and use space nuclear power systems where such systems safely enable or significantly enhance space exploration or operational capabilities.Earth Environment – Civil Space Guidelines: Space Science, Exploration, and Discovery. (1) Continue a strong program of space science for observations, research, and analysis of our Sun, solar system, and universe to enhance knowledge of the cosmos, further our understanding of fundamental natural and physical sciences. (2) Pursue capabilities, in cooperation with other departments, agencies, and commercial partners, to detect, track, catalog, and characterize near-Earth objects to reduce the risk of harm to humans from an unexpected impact on our planet and to identify potentially resource-rich planetary objects Earth Environment – Civil Space Guidelines: Environmental Earth Observation and Weather. The NASA Administrator, in coordination with other appropriate departments and agencies, shall conduct a program to enhance U.S. global climate change research and sustained monitoring capabilities, advance research into and scientific knowledge of the Earth by accelerating the development of new Earth observing satellites, and develop and test capabilities for use by other civil departments and agencies for operational purposes.Near Earth – Goals: Strengthen stability in space. Strengthening measures to mitigate orbital debris.Near Earth – Intersector Guidelines: Preserve the Space Environment. Pursue research and development of technologies and techniques, through the Administrator of the National Aeronautics and Space Administration (NASA) and the Secretary of Defense, to mitigate and remove on-orbit debris, reduce hazards, and increase understanding of the current and future debris environment .Near Earth – Intersector Guidelines: Identify Areas for Potential International Cooperation . Departments and agencies shall identify potential areas for international cooperation that may include, but are not limited to: long-term preservation of the space environment for human activity and use .Near Earth – Intersector Guidelines: Space Nuclear Power. The United States shall develop and use space nuclear power systems where such systems safely enable or significantly enhance space exploration or operational capabilities.Planetary Space - Civil Space Guidelines: Space Science, Exploration, and Discovery. Set far-reaching exploration milestones. By 2025, begin crewed missions beyond the moon, including sending humans to an asteroid. By the mid-2030s, send humans to orbit Mars and return them safely to Earth
  4. Earth Environment - Identify Areas for Potential International Cooperation. Departments and agencies shall identify potential areas for international cooperation that may include, but are not limited to: Earth science and observation; environmental monitoring; disaster mitigation and relief; search and rescue.Earth Environment – Intersector Guidelines: Space Nuclear Power. The United States shall develop and use space nuclear power systems where such systems safely enable or significantly enhance space exploration or operational capabilities.Earth Environment – Civil Space Guidelines: Space Science, Exploration, and Discovery. (1) Continue a strong program of space science for observations, research, and analysis of our Sun, solar system, and universe to enhance knowledge of the cosmos, further our understanding of fundamental natural and physical sciences. (2) Pursue capabilities, in cooperation with other departments, agencies, and commercial partners, to detect, track, catalog, and characterize near-Earth objects to reduce the risk of harm to humans from an unexpected impact on our planet and to identify potentially resource-rich planetary objects Earth Environment – Civil Space Guidelines: Environmental Earth Observation and Weather. The NASA Administrator, in coordination with other appropriate departments and agencies, shall conduct a program to enhance U.S. global climate change research and sustained monitoring capabilities, advance research into and scientific knowledge of the Earth by accelerating the development of new Earth observing satellites, and develop and test capabilities for use by other civil departments and agencies for operational purposes.Near Earth – Goals: Strengthen stability in space. Strengthening measures to mitigate orbital debris.Near Earth – Intersector Guidelines: Preserve the Space Environment. Pursue research and development of technologies and techniques, through the Administrator of the National Aeronautics and Space Administration (NASA) and the Secretary of Defense, to mitigate and remove on-orbit debris, reduce hazards, and increase understanding of the current and future debris environment .Near Earth – Intersector Guidelines: Identify Areas for Potential International Cooperation . Departments and agencies shall identify potential areas for international cooperation that may include, but are not limited to: long-term preservation of the space environment for human activity and use .Near Earth – Intersector Guidelines: Space Nuclear Power. The United States shall develop and use space nuclear power systems where such systems safely enable or significantly enhance space exploration or operational capabilities.Planetary Space - Civil Space Guidelines: Space Science, Exploration, and Discovery. Set far-reaching exploration milestones. By 2025, begin crewed missions beyond the moon, including sending humans to an asteroid. By the mid-2030s, send humans to orbit Mars and return them safely to Earth